BOVSTT – Buffer Overflow Vulnerability Services Tester Tool

BOVSTT is to detect the existence of remote/local stack-based buffer overflow vulnerabilities using the standard communication protocol for each service.

Overview

The application allows to customize the testing mechanism of each service through templates, these templates are simply plain text files, which accept some kind of special words (see STF section), these files are stored in the folder with a direct association between the protocol and the template and with the extension STF (Service Tester File).Currently, the application version 2.1 supports the FTP, POP3 and SMTP protocol.To carry out this task the application allows specifying different types of parameters.

1.1.3 Target PortDescription: Specifies the destination port of the service.Required: NoOptions: -tp –target-port <port>Accepted values: 1 – 65535If the user does not enter this parameter the application will automatically try to connect to the defaultdestination port according to the service and the type of encryption.For example, for POP3 service and SSL encryption, the default port would be 995.

1.1.5 Login UsernameDescription: Specifies the user of the credentials.Required: NoOptions: -lu –login-username <username>Accepted values: Alphanumeric value.This parameter allows to customize the authentication mechanism of the protocol.The application will initiate the authentication protocol through user / password as soon as it reads the#AUTH macro within the STF file associated with the protocol. If the authentication by user / password fails,the program will cancel its execution.Every time the application reads the keyword <login-username> inside the STF file, it will be replaced by thevalue of this parameter.

1.1.6 Login PasswordDescription: Specifies the password of the credentials.Required: NoOptions: -lu –login-password <password>Accepted values: Alphanumeric value.This parameter allows to customize the authentication mechanism of the protocol.Every time the application reads the keyword <login-password> inside the STF file, it will be replaced by thevalue of this parameter.

1.1.7 Buffer Size LengthDescription: Specifies the buffer size.Required: NoOptions: -bs –buffer-size-length <size>Accepted values: Numeric value greater than 0.Default value: 4096This parameter allows to customize the size of the buffer to send.Every time the application reads the keyword <buffer> inside the STF file, it will be replaced by the sentence{ –buffer-character } * { –buffer- size-length }, in this case for example A*4096.

5. In the Dev-C ++ IDE go to the Execute menu and click on the option to rebuild all (F12). If a dependency error occurs go to point 6, otherwise go to point 7.

6. In the Dev-C ++ IDE go to the Project menu and click on the option Project options (1), later go to parameters tab (2) and delete the line that appears in the Linker section (3), then click on the add library button and finally find the libwsock32.a library in the lib folder of the Dev-C ++ IDE(5), select it and return to point 5.

7. At this point, the BOVSTT.exe executable file should exist. Run the windows cmd.exe console and browse the filesystem until you find the project path.

8. Finally, run the BOVSTT.exe file with its parameters to start the test process.

In the following screenshot, you can see how the program detects the existence of a buffer overflow in the FTP service of the program FreeFloat FTP Server.

4. RUN THE PROGRAM WITHOUT COMPILATIONYou can run the program without having to do the steps described in section 3, only with running the file BOVSTT.exe through windows console.

Disclaimer

All the Content of this Article Belongs to above Original Author. “GBHackers On Security” won’t take any credits.This article is only for an Educational purpose.Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question.

The “Author” and “www.gbhackers.com” will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. Reproduce This Content Without Permission is Strictly Prohibited.

Subscribe to PHI via Email

Enter your email address to subscribe to PHI and receive notifications of new posts by email.

Join 1,478 other subscribers

Email Address

PROFESSIONAL HACKERS INDIA

We are proud to offer premier information security updates, IT updates, Core Tools And Techniques across the globe. Our mission is to make the internet more secure, more trendy, more aware and more reliable.